International Telecommunication Union   ITU
عربي  |  中文  |  Español  |  Français  |  Русский
 
 Advanced Search Advanced Search Site Map Contact us Print Version
 
Home : ITU-T Home : Workshops and Seminars : Security
   
 ITU-T Workshop on "New challenges for Telecommunication Security Standardizations"
 Geneva, 9 (PM) - 10 February 2009 Contact: tsbworkshops@itu.int 

Abstracts
Day 1, 09 February 2009 
14 30 - 1445 Opening remarks:
Reinhard Scholl, Deputy to the Director, Telecommunication Standardization Bureau (ITU-T)
Alexander Ntoko, Head, Corporate Strategy Division, SPM Dept., ITU
Arkadiy Kremer, Chairman, ITU-T SG 17
1445 - 1600
Session 1: Networks, users, services and information as protected objects

Chairman: William McCrum, (Industry Canada)
Vladimir Belenkovich, (AGC): From public networks to public services

The paradigm shift in the telecom world which was initially seen mainly as the transition from the circuit switching to the packet switching, from TDM to VoIP, happened to be an even more fundamental change of the mind set for networks and services designers and providers. The architecture of the underpinning network fabric is rapidly changing along with the new network technologies, but much faster the service architecture and business architecture are moving to the focus of the public services area stakeholders. The carriers’ networks do not provide yet full support and coverage for the new services already successfully tested and deployed in the public Internet space. Now, to be part of the Big Game coming, Network Providers form their request for the new inter-networking architecture, streamlined for the value networks support, to retain their customers. The governments, both as service providers and as regulators, have their own view of the new merging world of services.
David Goodman, (EEMA): New business-models for network operators
Ted Humphreys, (ISO): Information Security Management and Business
1600 - 1630 Coffee break
1630 - 1800 Session 2: ITU information security initiatives

Chairman: Mohamed M.K. Elhaj, (Vice-Chair, ITU-T SG 17)
Patrick Mwesigwa, (Vice-Chair, ITU-T SG 17): Business use of security standards
Ostap Monkewich, (Consultant, Industry Canada): Providing testability for ITU Recommendations

The presentation looks at Recommendations from the point of view of conformance and interoperability testing of products that implement ITU-T Recommendations. It addresses why we need to test, the kinds of testing that is relevant, the expected quality of test results and what companion Recommendations are needed for each base Recommendation we develop. It points to the existing Recommendations that prescribe these additional requirements and the means for developing higher-quality Recommendations.
Antonio Guimaraes, (Vice-Chair, ITU-T SG 17): International collaboration for national public networks security

An overview of WTSA-08 Resolutions related to telecommunication security, followed by a more detailed analysis of a recommended security baseline for national public networks operators. These proposals cover aspects of operators’ policy, technical tools and collaboration baseline. Finally, the ITU’s role in organizing and coordinating the International collaboration for national public networks security is discussed.
1800 - 2000 Welcome reception
 
Day 2, 10 February 2009 
0930 - 1100 Session 3: Cybersecurity

Chairman: Koji Nakao, (Vice-Chair, ITU-T SG 17)
James Ennis, (US Government): Best practices for organizing national cybersecurity efforts

IP-based networks are today a critical part of national economic infrastructures. One way that IP-based networks add value to a national economy is by facilitating commercial activities in all other national economic sectors.

Today, these IP-based networks are under attack. Weaknesses in IP-based networks are being exploited. The effectiveness of these activities undermines confidence in IP-based networks and prevents them from maximizing the value they can add to national economies. Billions of dollars are being lost annually as a result.

Because the Internet and other IP-based networks are global, the problem is also global. That is to say, instituting good cybersecurity practices in one country has a limited effect as long as other countries do not also institute good cybersecurity practices. Therefore, it is in the interest of all countries to work together to achieve global cybersecurity.

The ITU is addressing this problem in a number of ways. One way is to reach out to the developing world to assist developing countries to develop national cybersecurity programs based on best practices. One high level effort in this regard is found in the work of Question 22 of Study Group 1 of the ITU Development Sector. Q22 is developing a report on national best cybersecurity practices.

The report has identified five key components to a good national cybersecurity plan: (1) a national strategy; (2) a strong partnership between government and industry; (3) a sound legal foundation that addresses cyberattacks; (4) a national watch, warning, and incident response program; and (5) development of a "culture of cybersecurity awareness" among a nation's enterprises and individual users of IP-based networks.

The report also contains annexes that discuss spam and identity management and an extensive list of references and links to places where additional information on these topics can be found.

Q22 will complete its report in September, 2009. All interested parties are invited to participate in the next meeting of Q22, April 6-7 in Geneva.
Mikhail Kader, (Cisco): IP NGN Security Framework

The primary challenge faced by today’s service providers is maintaining service predictability in the presence of an outbreak of malicious traffic sourced from multiple endpoints spread across multiple network boundaries. In today’s terms, this type of behavior has been identified with threats such as distributed-denial-of-service (DDoS) attacks, turbo worms, e-mail spam, phishing, and viruses. The amount of traffic generated by infections and subsequent outbreaks can disrupt the normal operation of a modern network. Security has become a critical characteristic of all services and is essential to the profit line of service providers. This presentaiton will discuss how to maintain heightened network security, transition from the traditional reactive stance to an incrementally proactive stance by reducing windows of vulnerability, improving reaction times, and effectively mitigating attacks.
Magnus Kalkuhl, (Virus Analyst, Global Research and Analysis Team Kaspersky Labs GmbH): Fighting cybercrime in 2009

Modern malware does more than just infecting a couple of files for the fun of it's author - nowadays, malware is written for profit. Magnus Kalkuhl will show how this illegal business works and what can be done in order to protect the internet and its users.
1100 - 1130 Coffee break
1130 - 1300 Session 4: Secured applications

Chairman: Heung Youl Youm, (Vice-Chair, ITU-T SG 17)
Igor Milashevskiy, (INTERVALE): Secure Mobile Banking as Telecommunication Operator Service

Solutions in which a mobile terminal acts as a payment or banking terminal, and mobile network, as a secure transaction exchange environment are the important area of remote mobile payments. The implementation of such solutions leads to an effective extension of a banking infrastructure to all mobile terminals, which enables quicker adoption of banking services and makes financial environment potentially less conductive to fraudulent and disruptive activities.

A critical element needed to establish such mobile payment system is a robust interface between the banking system and mobile telecommunications networks, which will provide a binding and secure link between a person identity and a mobile subscriber identity.

The existing infrastructure of secure key storage and cryptographic calculation provided by the Subscriber Identity Module (SIM) / Universal Subscriber Identity Module (USIM) / Removable User Identity Module (RUIM) used in today’s mobile networks, on one side, and standard cryptographic Hardware Security Modules (HSM) used in modern banking systems, on the other side, can enable identity authentication within such solutions, combining security, reliability and non-repudiation.
Michel Riguidel,  (Telecom ParisTech, France): Future Internet Security

The current Internet was unable to adapt either to mobility, or to modern security. The Internet of the future will be polymorphous, created on the basis of different infrastructures. It is necessary to incorporate the split, the dynamic and evolving nature of digital systems. Our current information technology paradigms are in the process of being dissolved. The dichotomies between computer and networks, between hardware and software, between applications and services, between the logical and the virtual, between software and information, are in the process of being blurred or, more precisely, the terms of the caesura are radically changing meaning. The road map for the network architecture is following the same itinerary as the history of computer languages, with a complexification of the abstract structure typing. In international information technology research [www.inco-trust.eu], it is necessary to regain an intercontinental way of thinking. The world’s thoughts are undoubtedly localised: it is therefore necessary to consider the difference, the models of other-ness.
J.S. Lee, (ETRI, Korea): ITU-T Security Standardization on Mobile Web Services

Mobile industry is adopting Web Services technologies to the mobile domain since they can solve integration problems between operators, service providers, and content providers. Security is one of the important issues in the adoption of Web Services in the mobile environment, and this presentation provides a summary of standardization activities related to Mobile Web Services security in ITU-T SG17 focusing on X.1143(X.websec-3). X.1143 describes the security architecture and security service scenarios for message security in mobile Web Services. This presentation also briefly introduces X.websec-4 which is in the early stage of standardization in ITU-T SG17. X.websec-4 describes security threats and security requirements of the enhanced Web based Telecommunication Services.
1300 - 1430 Lunch break
1430 - 1600 Session 5: SDOs’ security standardization, implementation and evaluation strategy

Chairman: Herb Bertine, (former Chairman, ITU-T SG 17)
Walter Fumy, (ISO/IEC JTC 1/SC 27): ISO/IEC JTC 1/SC 27 - IT Security Techniques

ISO Committee SC 27 is a primary resource of International Standards on application-independent IT security techniques. The group has developed many specifications and guidelines already in use by commerce, industry and government. Major achievements range from cryptographic techniques to security management guidelines and security evaluation.

By continuously enhancing its work program and taking on board the latest in business practice (such as privacy technology and identity management), new and emerging threats and risks, as well as advances in technology, SC 27 is well positioned to shape the future of IT security.
Arkadiy Kremer, (Chairman, ITU-T SG 17): ITU-T Security Standardization

The presentation provides an overview of key security standardization activities in the ITU-T SG 17. The important initiatives and results of the ITU-T SG 17 in the area will be announced. The presentation will explain the mission and advantages of the ITU in ICT security standardization as the only global intergovernmental and industry collaborative technical organization. Collaboration with the other SDOs will present as a key for the work on security standards to improve the timeliness and effectiveness and avoid duplication of effort.
Carmine Rizzo, (ETSI): ETSI Security Standardization

The increasing complexity and rapid development of new systems and networks, the sophistication of changing threats, and the presence of intrinsic vulnerabilities present demanding challenges for the Information society in its efforts to secure Information and Communications Technology (ICT) systems and networks against the threats and related risks to which they are subject. To minimise exposure to risks, Security must be built in from the beginning when designing new architectures, and not added on at a later stage as an optional feature.

In such a challenging scenario, Information Security Standards are essential to ensure interoperability among systems and networks, compliance with legislations and adequate levels of security, thus creating a more secure and profitable environment for the industrial sector from SME to large global companies, as well as benefits for governmental organisations, research bodies and universities.

ETSI (European Telecommunications Standards Institute) is an independent, non-profit organization, whose mission is to produce telecommunications standards. ETSI has over 20 years of experience in global standardization efforts in various telecommunications areas, with strong focus on Security matters.

Within various Technical Bodies and Working Groups, ETSI's standardization activities cover a broad spectrum of security issues, including Next Generation Networks (NGNs), Electronic Signatures and Infrastructures, Smart Cards, Lawful Interception and Data Retention, RFID, GSM on aircrafts, Emergency and Public Safety Communications. In order to co-ordinate and promote standardization activities related to security issues across the various Technical Bodies, ETSI has an Operational Co-ordination Group on Security (OCG Sec). The proposed presentation will provide an overview of all such activities.
1600 - 1630 Coffee break
1630 - 1745 Session 6: Identification services

Chairman: Jianyong Chen, (Vice-Chair, ITU-T SG 17)
Tony Rutkoswki, (VeriSign): Identity Management

Identity Management is the foundation and core for all telecommunication/ICT security. The explosively expanding and vast array of "network nomadic" individuals, providers, and objects has challenged our ability to effectively manage their identities and trust anchors. This presentation describes these Identity Management challenges and the current global ecosystem of related work and activities, including a set of unique and critically important initiatives underway in the ITU-T designed to address those challenges. The presentation concludes with a global vision of Identity Management capabilities for 2009 and beyond that promise substantial enhancements for telecommunication/ICT security.
Erik Andersen, (Rapporteur, ITU-T SG 17): Identification Services as provided by directories (X.500 incl. X.509)

Identification services are essential within several IT-security areas. Secure identification is required for protecting of information against misuse, malicious modification, destruction of information and for preventing spiteful and unwanted use of services. The X.500 Directory specification provides means for storing identification information and it specifies elaborate mechanisms for protecting such information. In addition, X.509 provides specification for secure authentication and authorisation also to be used outside the strict areas of directory. X.509 also provides specifications for how to establish the necessary infrastructure for providing secure authentication and authorization.
Sang Rae Cho, (ETRI, Korea): Trend in User-Centric Identity Management Technology

This presentation will provide a brief summary how IdM technology has been evolved and why current IdM technologies have focused on three different aspects: user-centric, network-centric and application-centric. The presentation will also explain the current standardization effort in ITU-T and other Standardization Development Organizations. At the end, brief idea and concept of Digital Identity Wallet will be explored to demonstrate the state-of-art IdM technology.
1745 - 1815 Closing Remarks
Reinhard Scholl, Deputy to the Director, Telecommunication Standardization Bureau (ITU-T)
Alexander Ntoko, Head, Corporate Strategy Division, SPM Dept., ITU
Arkadiy Kremer, Chairman, ITU-T SG 17


 

Top - Feedback - Contact Us -  Copyright © ITU 2009 All Rights Reserved
Contact for this page : TSB EDH
Updated : 2009-02-05